Active Response to Computer Intrusions
暂无分享,去创建一个
[1] M. Otsuka. Killing the Innocent in Self‐Defense , 1994 .
[2] Fabio A. González,et al. An Intelligent Decision Support System for Intrusion Detection and Response , 2001, MMM-ACNS.
[3] William Yurcik,et al. Internet hack back: counter attacks as self-defense or vigilantism? , 2002, IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293).
[4] Douglas S. Reeves,et al. Tracing Based Active Intrusion Response , 2002 .
[5] Tom Killalea,et al. Guidelines for Evidence Collection and Archiving , 2002, RFC.
[6] Jody R. Westby. International guide to combating cybercrime , 2003 .
[7] Kenneth Einar Himma. Targeting the innocent: Active defense and the moral immunity of innocent persons from aggression , 2004, J. Inf. Commun. Ethics Soc..
[8] Kenneth Einar Himma. The Ethics of Tracing Hacker Attacks through the Machines of Innocent Persons , 2004 .
[9] cyberdetective. Convention on Cybercrime , 2007 .